ChaCha20-Poly1305

From HandWiki
Short description: Authenticated encryption with additional data algorithm

ChaCha20-Poly1305 is an authenticated encryption with additional data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code. Its usage in IETF protocols is standardized in RFC 8439.[1] It has fast software performance, and without hardware acceleration, is usually faster than AES-GCM.[2]

History

The two building blocks of the construction, the algorithms Poly1305 and ChaCha20, were both independently designed, in 2005 and 2008, by Daniel J. Bernstein.[3][4]

In 2013–2014, a variant of the original ChaCha20 algorithm (using 32-bit counter and 96-bit nonce) and a variant of the original Poly1305 (authenticating 2 strings) were combined in an IETF draft[5][6] to be used in TLS and DTLS,[7] and chosen by Google, for security and performance reasons, as a newly supported cipher.[8] Shortly after Google's adoption for TLS, ChaCha20, Poly1305 and the combined AEAD mode are added to OpenSSH via thechacha20-poly1305@openssh.com authenticated encryption cipher[9][10] but kept the original 64-bit counter and 64-bit nonce for the ChaCha20 algorithm.

In 2015, the AEAD algorithm is standardized in RFC 7539[11] and RFC 7905[12] to be used in TLS 1.2 and DTLS 1.2 and in RFC 7634[13] to be used in IPsec. The same year, it was integrated by Cloudflare as an alternative ciphersuite.[14]

In June 2018, the RFC 7539 was updated and replaced by RFC 8439.[1]

Description

The ChaCha20-Poly1305 algorithm as described in RFC 8439[1] takes as input a 256-bit key and a 96-bit nonce to encrypt a plaintext, with a ciphertext expansion of 128-bit (the tag size). In the ChaCha20-Poly1305 construction, ChaCha20 is used in counter mode to derive a key stream that is XORed with the plaintext. The ciphertext and the associated data is then authenticated using a variant of Poly1305 that first encodes the two strings into one. The way that a cipher and a one time authenticator are combined is precisely identical to AES-GCM construction in how the first block is used to seed the authenticator and how the ciphertext is then authenticated with a 16-byte tag.

The main external difference with ChaCha20 is its 64 byte (512 bit) block size, in comparison to 16 bytes (128 bit) with both AES-128 and AES-256. The larger block size enables higher performance on modern CPUs and allows for larger streams before the 32 bit counter overflows.

ChaCha20-Poly1305 Encryption

Variants

XChaCha20-Poly1305 – extended nonce variant

The XChaCha20-Poly1305 construction is an extended 192-bit nonce variant of the ChaCha20-Poly1305 construction, using XChaCha20 instead of ChaCha20. When choosing nonces at random, the XChaCha20-Poly1305 construction allows for better security than the original construction. The draft attempt to standardize the construction expired in July 2020.[15]

Salsa20-Poly1305 and XSalsa20-Poly1305

Salsa20-Poly1305 and XSalsa20-Poly1305 are variants of the ChaCha20-Poly1305 and XChaCha20-Poly1305 algorithms, using Salsa20 and XSalsa20 in place of ChaCha20 and XChaCha20. They are implemented in NaCl[16] and libsodium[17] but not standardized. The variants using ChaCha are preferred in practice as they provide better diffusion per round than Salsa.[3]

Reduced-round variants

ChaCha20 can be replaced with its reduced-round variants ChaCha12 and ChaCha8, yielding ChaCha12-Poly1305 and ChaCha8-Poly1305. The same modification can be applied to XChaCha20-Poly1305. These are implemented by the RustCrypto team and not standardized.[18]

Use

ChaCha20-Poly1305 is used in IPsec,[2] SSH,[19] TLS 1.2, DTLS 1.2, TLS 1.3,[12][19] WireGuard,[20] S/MIME 4.0,[21] OTRv4[22] and multiple other protocols. It is used in Software like Borg[23] as standard data encryption. Among others, it is implemented in OpenSSL, and libsodium.

Performance

ChaCha20-Poly1305 usually offers better performance than the more prevalent AES-GCM algorithm even on systems where the CPU(s) have the AES-NI instruction set extension.[2] Encryption and decryption speeds with software implementations are already above 1 GB/s when done on a single core, scaling up almost linearly if more cores are used in parallel. AES-NI reaches roughly same speed on a single core but does not scale as well to multiple CPUs, and without the instruction set extension it is difficult to implement efficiently. As a result, ChaCha20-Poly1305 is sometimes preferred over AES-GCM due to its similar levels of security and in certain use cases involving mobile devices, which mostly use ARM-based CPUs.

Security

The ChaCha20-Poly1305 construction is proven secure in the standard model and the ideal permutation model, for the single- and multi-user setting.[24] However, similarly to GCM, the security relies on choosing a unique nonce for every message encrypted. Compared to AES-GCM, implementations of ChaCha20-Poly1305 are less vulnerable to timing attacks.

See also

External links

  • RFC 8439: ChaCha20 and Poly1305 for IETF Protocols
  • RFC 7634: ChaCha20, Poly1305, and Their Use in the Internet Key Exchange Protocol (IKE) and IPsec
  • RFC 7905: ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)
  • RFC 8103: Using ChaCha20-Poly1305 Authenticated Encryption in the Cryptographic Message Syntax (CMS)

References

  1. 1.0 1.1 1.2 Nir, Yoav; Langley, Adam (June 2018), ChaCha20 and Poly1305 for IETF Protocols, doi:10.17487/RFC8439, RFC 8439, https://tools.ietf.org/html/rfc8439 
  2. 2.0 2.1 2.2 Nir, Yoav; Langley, Adam (June 2018), ChaCha20 and Poly1305 for IETF Protocols, sec. B, doi:10.17487/RFC8439, RFC 8439, https://tools.ietf.org/html/rfc8439 
  3. 3.0 3.1 Bernstein, D. J. (January 2008). "ChaCha, a variant of Salsa20". The State of the Art of Stream Ciphers. 8. pp. 3–5. https://cr.yp.to/chacha/chacha-20080120.pdf. 
  4. Bernstein, Daniel J. (2005), "The Poly1305-AES Message-Authentication Code", Fast Software Encryption, Lecture Notes in Computer Science (Berlin, Heidelberg: Springer Berlin Heidelberg) 3557: pp. 32–49, doi:10.1007/11502760_3, ISBN 978-3-540-26541-2 
  5. Langley, Adam (September 2013), ChaCha20 and Poly1305 based Cipher Suites for TLS, I-D draft-agl-tls-chacha20poly1305-00, https://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-00 
  6. Nir, Yoav (27 January 2014), ChaCha20 and Poly1305 for IETF protocols, I-D draft-nir-cfrg-chacha20-poly1305-00, https://tools.ietf.org/html/draft-nir-cfrg-chacha20-poly1305-00 
  7. Langley, Adam; Chang, Wan-Teh; Mavrogiannopoulos, Nikos; Strombergson, Joachim; Josefsson, Simon (24 January 2014), The ChaCha Stream Cipher for Transport Layer Security, I-D draft-mavrogiannopoulos-chacha-tls-01, https://tools.ietf.org/html/draft-mavrogiannopoulos-chacha-tls-01 
  8. Bursztein, Elie (24 April 2014). "Speeding up and strengthening HTTPS connections for Chrome on Android" (in en). https://security.googleblog.com/2014/04/speeding-up-and-strengthening-https.html. 
  9. Miller, Damien. "Super User's BSD Cross Reference: /OpenBSD/usr.bin/ssh/PROTOCOL.chacha20poly1305". http://bxr.su/OpenBSD/usr.bin/ssh/PROTOCOL.chacha20poly1305. 
  10. Miller, Damien (29 November 2013). "ChaCha20 and Poly1305 in OpenSSH" (in en-GB). http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html. 
  11. Nir, Yoav; Langley, Adam (May 2015), ChaCha20 and Poly1305 for IETF Protocols, doi:10.17487/RFC7539, RFC 7539, https://tools.ietf.org/html/rfc7539 
  12. 12.0 12.1 Langley, Adam; Chang, Wan-Teh; Mavrogiannopoulos, Nikos; Strombergson, Joachim; Josefsson, Simon (June 2016), ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS), doi:10.17487/RFC7905, RFC 7905, https://tools.ietf.org/html/rfc7905 
  13. Nir, Yoav (August 2015), ChaCha20, Poly1305, and Their Use in the Internet Key Exchange Protocol (IKE) and IPsec, doi:10.17487/RFC7634, RFC 7634, https://tools.ietf.org/html/rfc7634 
  14. "Do the ChaCha: better mobile performance with cryptography" (in en). 2015-02-23. http://blog.cloudflare.com/do-the-chacha-better-mobile-performance-with-cryptography/. 
  15. Arciszewski, Scott (10 January 2020), XChaCha: eXtended-nonce ChaCha and AEAD_XChaCha20_Poly1305, I-D draft-irtf-cfrg-xchacha, https://tools.ietf.org/html/draft-irtf-cfrg-xchacha 
  16. "NaCl: Networking and Cryptography library - Secret-key authenticated encryption". https://nacl.cr.yp.to/secretbox.html. 
  17. "libsodium - Authenticated encryption". https://doc.libsodium.org/secret-key_cryptography/secretbox. 
  18. "chacha20poly1305 - Rust". https://docs.rs/chacha20poly1305/latest/chacha20poly1305/#supported-algorithms. "ChaCha8Poly1305 / ChaCha12Poly1305 - non-standard, reduced-round variants (gated under the reduced-round Cargo feature). See the Too Much Crypto paper for background and rationale on when these constructions could be used. When in doubt, prefer ChaCha20Poly1305. XChaCha8Poly1305 / XChaCha12Poly1305 - same as above, but with an extended 192-bit (24-byte) nonce." 
  19. 19.0 19.1 Thomson, Martin; Turner (May 2021), Using TLS to Secure QUIC, doi:10.17487/RFC9001, RFC 9001, https://tools.ietf.org/html/rfc9001 
  20. Donenfeld, Jason A.. "Protocol & Cryptography - WireGuard" (in en). https://www.wireguard.com/protocol/. 
  21. Housley, Russ (February 2017), Using ChaCha20-Poly1305 Authenticated Encryption in the Cryptographic Message Syntax (CMS), doi:10.17487/RFC8103, RFC 8103, https://tools.ietf.org/html/rfc8103 
  22. OTRv4, OTRv4, 2021-12-25, https://github.com/otrv4/otrv4/blob/12cc3018577901e27715680ec9cb94b2562438b9/otrv4.md, retrieved 2021-12-28 
  23. borg rcreate, borgbackup, 2022-08-03, https://borgbackup.readthedocs.io/en/2.0.0b4/usage/rcreate.html#choosing-an-encryption-mode, retrieved 2023-01-28 
  24. Degabriele, Jean Paul; Govinden, Jérôme; Günther, Felix; Paterson, Kenneth G. (2021-11-12), "The Security of ChaCha20-Poly1305 in the Multi-User Setting", Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA: Association for Computing Machinery): pp. 1981–2003, doi:10.1145/3460120.3484814, ISBN 978-1-4503-8454-4, https://doi.org/10.1145/3460120.3484814, retrieved 2021-12-27